Skip to content

Commit 911ed26

Browse files
committed
updated draft
1 parent e2a7205 commit 911ed26

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/openshift/howto-enable-nsg-flowlogs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ keywords: azure, openshift, aro, red hat, azure CLI
1111
#Customer intent: I need to create and use an Azure service principal to restrict permissions to my Azure Red Hat OpenShift cluster.
1212
---
1313

14-
# Enable NSG flow logs
14+
# Enable Network Security Group flow logs
1515

1616
Flow logs allow you to analyze traffic for Network Security Groups in specific regions that have Azure Network Watcher configured.
1717

@@ -36,25 +36,25 @@ Create a storage account for storing the actual flow logs. It must be in the sam
3636
The service principal used by the cluster needs the [proper permissions](../network-watcher/required-rbac-permissions) in order to create necessary resources for the flow logs and to access the storage account.
3737
The easiest way to achieve that is by assigning it the network administrator and storage account contributor role on subscription level. Alternatively, you can create a custom role containing the required actions from the page linked above and assign it to the service principal.
3838

39-
To get the service principal ID, run
39+
To get the service principal ID, run the following command:
4040
```
4141
az aro show -g {ResourceGroupName} -n {ClusterName} --query servicePrincipalProfile.clientId -o tsv
4242
```
43-
and use the output to get the object ID.
43+
Use the output of the above command to get the object ID:
4444
```
4545
az ad sp show --id XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX --query id --out tsv
4646
```
47-
To assign network admin:
47+
To assign network admin, run the following command:
4848
```
4949
az role assignment create --assignee "{servicePrincipalObjectID}" --role "4d97b98b-1d4f-4787-a291-c67834d212e7" --subscription "{subscriptionID}" --resource-group "{networkWatcherResourceGroup}"
5050
```
51-
To assign storage account contributor:
51+
To assign storage account contributor, run the following command:
5252
```
5353
az role assignment create --role "17d1049b-9a84-46fb-8f53-869881c3d3ab" --assignee-object-id "{servicePrincipalObjectID}"
5454
```
5555
See [this page](../role-based-access-control/built-in-roles) for IDs of built-in roles.
5656

57-
- Create a spec like this or update the existing one to contain spec.nsgFlowLogs in case you are already using another preview feature:
57+
Create a spec as in the following example, or update the existing spec to contain `spec.nsgFlowLogs` in case you are already using another preview feature:
5858
```
5959
apiVersion: "preview.aro.openshift.io/v1alpha1"
6060
kind: PreviewFeature

0 commit comments

Comments
 (0)